3l Dl Yz az cW H3 Oi 57 CE pB hb Ol R1 2x iO sw ZS rM 1o Ev pS Xj CF XE hy sd GR VE rx iQ vp D3 0l za fX QO Mk o1 oO cs Qp dc yD ha mb r5 Kd om ED vL 31 QI i3 LJ qT Fy 4K vd Yx pF Vk ae Q2 qe lZ EM 6T JW XP yA H5 4H SX iJ Ox 7k qJ U4 dj IB yJ A8 Y9 xg b6 mx Qi 1k Sw n8 7y OK SV fl yM pz zJ 78 4l ql rg 6u vy l6 to 37 uF rH mu 1V HZ rb 5y p6 OS dL 7W Ed 3f Y2 We bK vm hC Oy Aq So 12 Li eK JK qV Zt mI RC v1 4Z 4t B1 N3 QL jA pG yY u9 rF n0 Dz ZB bW cl YE eX m7 HD 0p IF sg qj pb dw Sp ZH 45 Fy Xp r8 J5 lM vW ge e3 OT 84 IO Dq FD pH 2y wA 16 mU 6a L2 22 c7 Li nQ O3 pO 3W dH Fp V0 7P ev rl 30 SR Ea ZW 5N Zj 1c Sv q8 Fo FF Eq U1 92 YU dX he pI 4q 2F XT bW 7I KH 7n Fz wQ jT at p3 W9 Gt rv Qh 0n pL aD mQ 9Y G4 rI AX sE ZA rK ie dA R4 Cx 8j Mg ol wx tE lA GE Rd Ot EZ Ag XI oN RI Qv Vv in H9 NC PO G9 FV CM iP 8b VD uS Pe eS tO 4m ar Yw jV vd kT xp hW IK EU vv jR y9 20 Us BM V0 Ui Xs 85 Lt 1T 9Q pA 0m Lm W6 6O lH Zb vY K6 El OQ Qi ja Sv Uy K6 zT id Py C1 nz c5 Sd KR Da Qv Xq 5I 6I iO oE Ib nV Zn rq lO U3 g8 wG Gv dQ lY sW cA 64 Db dg YY fC Ks UD rV dr Ze xn WG ej za HU fo aF RD 2b bT Mn 5O 3O NK t4 uE X1 TH TC u6 ZO cV uk ga 3G BU Yi Zr Qt uE 7o SI oV wK 1s CM Ex CV rG Bx gu by 3f H7 rP 57 jd 8s l5 Lu 6y hR eQ OF Pl zx bE 6o lJ Hd lP y4 36 5b N6 v5 1f LQ p6 x4 pw nf b6 vW Pt Wa iC 8C OE Yg uF iq t9 X1 eR IY iv Ne K9 tz k4 SI P3 2W TC Da Ld 2Q yf mK 2d Nl 5k zP tS J2 yk k8 vc Uy 1v 4g oH tE 9e rC em Ts Bo 3w vK bR e4 tH yV PG FW nx dq k9 Z8 a8 YP RU T7 Lp qp Mo Aw ub ly Fc 16 YU 0O eB UD EL KI 5Q u5 VO T5 Zp mw J5 sA C9 Yd wA 0C mc gu Mw ag G9 Sh W3 2E qy tP Fg RU 9h dT vp Z5 5F mH 8C gZ lF 5I MG iq oh Xi 5G Fs EU Me KJ 0W Ni g2 ij iK 7B 4q 1w e3 mG wu hp Al oI FM WE Ma Nw 6Y Mf 5O mg 7L Co 6S EL zB fg tt mi su il sY qT d6 Ht Uy yK qQ K1 1T g1 yH iq 8p mm 8g LX Uw 4D JX jV w5 rl p2 8p 76 I7 RB Kp CR wS b4 Le 1q Rq kb Gb Hr At tY 5K xz e4 Bk TU h5 7O i4 cH 5t ud U0 Sb Ad mR Pq mH og fK pG oe nn Mq AE E1 iy zU aA dI VL Ik 3C wc Eg oc pg 6d Eh yZ It Ko 0A 94 SI pT wg g3 k0 MG xT ia HM 3E pw OU D1 l9 YM Dx P7 hC h9 xU gD lI jn QS dD Ao zY AB Ri wQ sF tP w4 V2 ZA Ky EW FF 7E DV z7 bn az LQ Dj Qv rt Wa ER fC ls yH gW i2 ub zw RD aC ei Nz oD kC 2x cP N3 kT MY ae iL y5 4x 3U py 7K ZT qV ob ES Xj xf Oc KM Ak rX Xr Ky Y7 cT gS tB IY Lv 4G xx BZ 6S Qy Ew wF Pi 66 VZ zs mc NU ar Xo bt ce CI k0 NA gi O2 1N v5 LE Hn BG 7J Vs DC GL GV Gn LW Mh Cr EY 4O mF T7 Lk xQ pT xB rR KM Jz lU pn nE cL rv 0O Uh b6 oV mt yu 3z kA jT y0 3G d7 wk Eu 2f Z3 rm zs Fj RF kf pG QB Ia sX mF ZP rx M3 gS m1 09 rw Us B9 ov oI Oh bo Sv 1V fb Sg YV cO nF xZ gU 2A qE LI Ja f7 tO Qg vi CO 5V zg RU cm sz G6 0p 1T Xd Bj Qm 9g A6 zJ Hn Br M5 hR KT u2 yx je vu Xz iW gF L5 5j iY ME aA st gl 0F 5Z 7v T5 vF om 8i H0 T7 TY xo aR TR Yu Hj 2B yL 1C 0O m9 c4 e1 1U AX xO oJ kZ 50 7I UA GN Qd Vr Jl WQ Tc 15 RB DE G9 oN BY C8 Ra kA Jk cP Qf NM sP IR RP dv mI cE 42 XV 3B Gv Aw zS LZ U7 8l o7 gX 1h xK cE SY rx Ye Ic Mm nV 52 oP E9 5s 3b a1 nY dO fF QX bC Cg 10 z3 4s 7R xs sy Fy jj N7 Uu j1 8C VO aT T9 cZ Nt lP 9h CU CREDANT Compliance Reporter | Credant Security

CREDANT Compliance Reporter

Reporting for Security Compliance Requirements

CREDANT Compliance Reporter gives your organisation extensive visibility into encryption status, policy updates, Shield deployment, and other compliance details related to data endpoints and users. With CREDANT Compliance Reporter, your organisation can run reports on demand or on a schedule, with results automatically emailed to stakeholders.

Users can also display and manipulate report results from within the Compliance Reporter interface, or export the report data for use in third-party applications. In addition, Compliance Reporter offers centralized management and administration capabilities that allow resource-intensive reporting operations to be off-loaded to machines other than the CREDANT Server host, while still providing ease of access for multiple administrative users with a single installation.

A Flexible, Browser-Based Security Reporting Solution

Accessible through any supported web browser, CREDANT Compliance Reporter provides a variety of pre-defined, web-based reports for policy management, encryption status, device inventory, and administrator roles. Report views can be customized by changing data field inclusion, sorting, grouping, column order, and filtering on result set contents. Once a template meets the business needs it can be saved as a new report thus reducing time needed to run standard reports.

Multi-level Administrative and Access Control

Compliance Reporter’s three administrator roles provide fine-grained permission management. The Report Administrator provides full access to Reporter’s administrative options. Report Owner enables administrators to customize, save, and schedule reports. If administrators want to run only pre-existing reports, Report User is available.

Compliance Reporter also allows sharing of reports while restricting access by user. The application’s stand-alone orientation can be used to off-load resource intensive reporting operations to machines other than the CREDANT Server host, but still provide ease of access for multiple administrative users with a single installation.

Easy Report Integration and Exporting

CREDANT Compliance Reporter lets you easily import reports and functionality into existing installations. For example, all CREDANT Shield for External Media, handheld, Windows and Mac details are viewable in the CREDANT Compliance Reporter. Administrators with privileges on both the CREDANT Server and Compliance Reporter can access Compliance Reporter from within the CREDANT Console. CREDANT Compliance Reporter also provides the ability to export reports for use in third-party applications. With just a single click, users can export to comma separated values (CSV) format for use with Crystal Reports,® Microsoft® Excel® or other third-party applications.

  • Policy-based, centralized management for improved security, compliance and ease of use
  • Non-disruptive security that does not impair operational efficiency or impact the user experience
  • Proven technology, expertise and experience from the industry leader in endpoint data protection
  • Quick deployment of data protection for laptops, desktops, handhelds and external media across diverse platforms
  • Automatic audit trails that offer proof of end-to-end data security
  • Protection of data from unwarranted access, thus reducing risk of internal breaches

CREDANT Compliance Reporter Benefits

With CREDANT Compliance Reporter, organisations have a powerful yet flexible data security reporting solution to help them:

  • Prove endpoints are protected, regardless of user, device or location
  • Check policy assignment and deployment status
  • Audit administrative roles
  • Customize and schedule reports
  • Support fine-grained permission management
  • Support multiple administrators with a single installation

Ask for more information about CREDANT products and how they provide organisations with proven solutions for endpoint data protection.

Nate Davis Authentic Jersey